STICKY: NAME IT WHAT YOU LIKE

Making installs through the source Is not difficult.
I am aware that 99% of people who use linux and visit daniweb are probably more than capable of doing this. And I have noticed a select few on IRC ( the rare times I do get on IRC using encrypted shell accounts) who were unable.

The method shown below should cover generic installs for all eventualitues (except RPM packages).
For the example, I shall use "nmap-3.50.tar.gz" because everyone needs nmap.


1. Find the file type, and decompress

  • This is more useful than it sounds. For example, you download a .tar.gz file in Mozilla, and Mozilla decompresses it on-the-fly, but saves it with the .gz extension still there - it is now only a tar file, but the file extension suggests you need to run gunzip, or the tar -z option... Running this will tell you more about the file you're trying to install:
    file nmap-3.50.tar.gz

    The output will tell you that the file is either "gzip compressed file" or "tar archive".
    If the file is "gzip compressed", run the following:

    gunzip nmap-3.50.tar.gz

    This will leave you with a file called nmap-3.50.tar
    You can now untar the file,

    tar -xvf nmap-3.50.tar

    If the file has a .bz2 extension, or shows "bzip compressed file" as the output of the file command, you should run:

    bunzip2 file.tar.bz2
    tar xvf file.tar

    2. Configure

  • Now execute the following:
    cd ./nmap-3.50

    (of course, use the directory created from the extraction of the files from the tar archive)

    ./configure

    (configure scripts can often take paramaters, although usually don't need to unless you are installing software in conjunction with other software (e.g. Apache and PHP) or if your system has required libraries in a different place to usual, you can tell configure where to find them.

    type ./configure --help

    to list the options you can pass to the script.


    3. Compiling & Installing

  • If configure ran successfully, i.e. did not exit with an error message, you can now run the following:
    make &&
    make install

    (the && after make prevents 'make install' running unless make successfully completed).


    4. Optional Steps

  • You can now optionally type:
    make clean

    to clear up a few files and perhaps save a bit of disk space, granted this isn't usually a problem for most people living in modern times with computers having excessively large hard drives.Hey, you never know!

I wrote this paper a week ago and earned myself yet another A in class, looks like Im headed for another 4.0 this semester. Hopefully I obtain all my certs.
CISSP CISM CISA. Because security is my forte. Enjoy!

Recommended Answers

All 3 Replies

...an encrypted shell account? I've never seen or heard of one of those, and I've been on IRC for a VERY long time. Could you explain to me what that is? I know what a bouncer is (like bnc), but I've never heard of an encrypted shell account. Or do you mean using SSH to connect to a UNIX shell account?

Nice job on the tutorial, btw :)

Lol, I guess is not that common. Yeah, we have been doing it for years.(1997) c slashdot.org http://slashdot.org/articles/02/01/26/2119252.shtml
Hint to people do not use IRC with a root or admin user......pls do yourself a favor. Tell them Ogre.

Nice job on the tutorial, btw :)

Thanks, it's not a tut though just a sticky that has not been stuck. I guess the mods don't pay much attention in here or they don't know what the sticky is about.

PS: Ogre, not to mention chatting on a 128 bit encrypt. *wink*wink*

Be a part of the DaniWeb community

We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.